About your Search

20130401
20130430
STATION
CSPAN 36
CSPAN2 24
CNBC 5
FBC 5
COM 4
KNTV (NBC) 4
CNNW 1
KBCW (CW) 1
KICU 1
KPIX (CBS) 1
MSNBCW 1
LANGUAGE
English 89
Search Results 0 to 49 of about 89 (some duplicates have been removed)
you. >> discussion of cybersecurity and critical infrastructure including the electric grid thinking and air travel. >> the museum is meant to help a visitor relive the first eight years of the 21st century. the museum explains the decision-making process that i went through as president and we hope the museum inspires people to serve who want to serve their community were served their country in some way. >> we really didn't want to be a school. we wanted to be a -- so i don't know if there's a lesson there. i do know that laura has gone in a different direction with the component of the programs and which programs will emerge. >> this week on "the communicators" a look at cyberattacks and critical and destruction the united states. in his state of the union address president obama said that our enemies are seeking the ability to sabotage her power grid are financial institutions are air traffic control systems could we have representatives this week from all three of those industries. gentleman i want to start with an opening question for each of you. what are some of the attacks t
is investigating and pross dueting cybersecurity crimes and four would be protecting my no, sir from physical and psychological harm. whatever is done in this bill has to fit withen those categories. as speakers have said already, great work has been done in trying to protect the privacy and civil liberties all of us have. those who have grave concern that we have not fixed those, i would ask them to simply go review the contract they have with their internet service provider. they have ceded immense personal liberties and privacies to sign up with that internet service. as we look at what we're trying to do with this bill, i would argue they may have gone past that already. this bill does nothing like that no personal information can be shared. last mandate the government put many place that filters so as that data comes in at the speed of light, no one is reading it, it's machine to machine, personal information is scrubbed from that. there's reporting requirements for the system to put in place so if there are occasional breaches that those breaches are reported on a timely basis to the co
assistant secretary for cybersecurity. when it comes to financial youitutions, how do prevent attacks? what attacks are happening? >> attacks are always evolving. for the financial services sector most recently we have seen so-called distributed denial of service attacks, a way of flooding a network with information requests that cause a slowdown or a stop in service. cyber criminals are after money , as was willie sutton in the days of robbing banks. they are after intellectual property. lots of information. the attacks and threats are constantly evolving. the banks are very well prepared for that. they invest hundreds of millions of dollars in preventative measures, in various high-tech staff who have great expertise in this area. i am representing the financial services information sharing and analysis enter which is a grouping of banks and financial institutions that gather together their collective intelligence, share information about threats and vulnerabilities and collectively respond. it is all based on the notion that forewarned is forearmed. none of us are as smart as all of us c
homeland security assistant secretary for cybersecurity. when it comes to banks and financial institutions, mr. garcia, how do you prevent the attacks? what kind of attacks are happening? >> guest: well, you know, the attacks are always evolving, and for the financial services sector most recently we have seen so-called distributed denial of service or ddos attacks which is a way of flooding a network which information requests that cause a slowdown or a stoppage of service. cyber criminals are after money, as was willie sutton back in the days of robbing banks. they're after intellectual property. lots of different types of information. so the attacks and the threats are constantly evolving. the banks are very well prepared for they a ons of llars in preventive measures, in very high-tech staff who are, have great expertise in this area. i'm representing the financial services information sharing and analysis center, isaf, which is a grouping of banks and financial institutions that gather together their collective intelligence, they share information about threats, attacks and vulnerabil
that keeps me up is cybersecurity. secretary panetta and one of his last speeches describe the single biggest threat to the united states. when he says that, you certainly have to listen. we have been targeted, all of the big banks have been targeted. cybersecurity is not just about hackers. it is not just about guys trying to get your credit card number. in the case of many economies, there has been a lot of press about china and iran and israel. it is a reality. sophisticated people. building firewalls against them will be difficult. we have got a strong team. this is a threat. it is one that should keep us all up at night. >> on a more positive note, you have traveled around. this is a personal question. where do you see opportunities that people should take a second look at? i think columbia is a strong market for u.s. exporters. do you have a couple of places in mind? >> yes. there is a term that we use internally. we call it frontier economies. mongolia, etc. they are actually quite strong. they have got hard-working people and are increasingly well-educated. typically pretty strong lea
and cybersecurity entities and for other purposes. the chair: when the committee of the whole rose on wednesday, april 17, 2013, amendment number 4 printed in house report 113-41 offered by the gentleman from rhode island, mr. langevin, had een disposed of. it's now in order to consider amendment number 7, printed in house report number 113-41. for what purpose does the gentlewoman from arizona seek recognition? ms. sinema: i yield myself such time as i may consume. i have an amendment. the chair: does the gentlewoman offer an amendment? ms. sinema: yes, sir. the clerk: printed in house ms.rt number 113-offered by ms. sinema from arizona. the chair: a member opposed each will control five minutes. the chair recognizes the gentlewoman from arizona. ms. sinema: my amendment is simple and straightforward. currently this bill, 624, requires the inspectors general of the intelligence community, departments of justice and defense, as well as the privacy and civil liberties board to submit a report to congress every year regarding the use of the information shared with the federal government. this ame
.s. is on the offense when it comes to china and cybersecurity. "the wall street journal" reporting the obama administration is considering several aggressive options to confront china ranging from diplomatic pressure to indicting chinese nationals in u.s. courts. officials tell "the journal" these options is not necessarily imminent, but they demonstrate how cybersecurity has become a central part of diplomacy. >>> and the dreamliner could be flying again within weeks. the faa has approved the aircraft maker's plan to fix its troubled batteries. >>> the top trending stories. plus the atf wants to know what caused a massive ferlt lieser plant explosion in texas. >>> and a funny car that provides anything but laughs in north carolina. details next. >>> more than four days after that huge explosion at a fertilizer plant in central texas, officials say everyone is accounted for. 14 people killed, 200 injured, and of the 14, 10 were first responders. gabe gutierrez reports from west, texas. >> reporter: new video of the damage in west, texas, after a fertilizer facility exploded in a blinding fir
. speaker. cybersecurity threats represent one of the most serious national security and economic challenges we face in our nation. whether it's criminal hackers, organized crime, terrorist networks or nation states, our nation is under siege from dangerous cybersecurity threats that grow daily in frequency and sophistication. it is critical that the federal government address cybersecurity threats in a manner that keeps pace with our nation's growing dependence on technology. but current federal law does not adequately address the nature of today's cybersecurity threats. since its enactment in 2002 of the federal information security administration act, it has become the check the box compliance legislation that has little to do with minimizing cyberthreats, and yet the government accountability office recently found that security incidents among 24 key information increased by 650%, or more than six-fold in the last five years. to address the rising challenge poised by cyberthreats, ranking member cummings and myself introduced in the last congress a bill to re-authorize fizz ma. -- fisma.
private information that arrives. host: we're talking with catherine lotrionte about cybersecurity and privacy. she is a professor at georgetown university, cyberproject founder. she's also a former counsel to the white house foreign intelligence advisory board. if you want to get involved in our conversation, please give us a call. .he numbers are in your screen you can also send us messages via social media, twitter@c-span wj. we also still take an e-mail or two. why does the government need this information from private companies like comes to cybersecurity? guest: there are certain things that the government have the capability of collecting themselves. they have a sense of the breadth and the depth of the threat that is being faced now. the number of private entities, banks, news media outlets, "new york times" under cyber attacks what the government has determined is that a key to the success in stopping these attacks is that we need to have as much information about the threat is possible. the private sector and the government from whole different set of information -- somet
cybersecurity r&d. our committee addressed specific needs in cybersecurity , r&d separately in h.r. 756 but in doing so, we made sure that both the intellectual and financial resources for cybersecurity r&d are appropriately integrated with the rest of the federal n.i.t. portfolio. information security r&d should not take place in an of itself. it bears on all networking and information technologies. in closing, n.i.t. technologies cut across every sector of our economy and our national defense infrastructure. our relatively modest 20-year investment in nitr-d programs has contributed immeasurably to our economic and national security by enabling innovation and job creation in the n.i.t. and providing american students with the skills to fill these jobs. let's re-authorize this program today and ensure that it remains strong. i want to thank my friend, mrs. lummis, for reintroducing a bipartisan bill once again in this congress and i also would like to thank my staff and in sokolo for their hard work on this bill and i urge my colleagues to support h.r. 967 and reserve the balance of my
's a new urgency going on ishole cybersecurity issue. and i think every industry needs to be proactive because we all are very interdependent, as greg indicates. >> host: gautham nagesh. >> you spoke that the industry has standards, but they are largely minimums. what impact has that had across the energy sector? have those standards helped compel better security practices? >> guest: i don't mean to imply that the standards are minimum, that we're not trying to do good standards. i just think in any kind of standards regime they are the minimum that people are required to do, and then you go beyond that, you need to go beyond that. for example, beyond our standards we've set up threat scenario projects with michael chertoff and his group, the former secretary of homeland security. we are, so we go from those threat scenario projects. we've got working task forces on each of the key elements that we think are important, tools and technologies. war the, what are the best technologies we can use for both prevention and te -- detection. secondly, on the issue of information sharing, what a
the nrc in 2009 issued a cybersecurity role for power reactors, and the final impliation will occur in 2014 or 2017 depending on particular out age plants. nonetheless there are basically eight step in this case had work through. they had to work through seven of the steps and they were to complete the seven steps bit end of past december 2012. rein the process of inspecting when they have done. so we have been thinking through this. we also have a cybersecurity team dedicated to anticipating new issues as they come along. so we're taking this very seriously. and now we have developed very recently a road map for fuel cycle facility, dealing with cybersecurity issues for and test reactors and for by product materials, licensees, for the set of folks as well. >> which is a six to eight year implementation period. cybersecurity -- . >> a lot of the reactors -- >> at the end of eight years, in a computer field it's hard to imagine a standard set eight years is still valid. is this like checking boxes? so you have this, that and the other. >> putting both. >> okay. all right. may i ask
the u.s. budget, job creation, immigration reform and cybersecurity. in another news, total sales expected to drop more than 1% due to the early easter holiday. >>> and in the tech world, microsoft is thinking about a smaller screen. "the wall street journal" reports the company is developing a seven-inch tablet to go into production later this year, as it competes against google's nexus and the ipad mini. >>> another big rally on wall street drove the s&p down to record closes. the nasdaq hit a 12-year high. that news came from meeting minutes mistakenly sent tuesday night. officials released the minutes at 9:00 a.m., instead of the usual 2:00 p.m. weekly jobless claims are out and investors are anxious to find out if the reports were a fluke or a troubling find. and just this morning, toyota, honda and nissan are recalling 3 million vehicles worldwide due to defects in air bags. >>> and the reported china deadly flu outbreak it's taken a 13% toll on china sales. fell to the lowest level in six years down 23% from last march. a decrease from 12% from the previous quarters. >>> pc
to be gone in order to ensure we are protected. probably have to be cybersecurity people on duty as well. those would be limited numbers of people, but it is our intention that everyone would be taking a day. >> thank you. shifting gears, in a few days, a couple of weeks, i will be holding another round of town meetings in my district. alabama, alonge, the gulf coast. like most members of congress, i enjoy going home and talking with people i work for, hired me for a two-year contract, so i look forward to town hall meetings, but i will ask you this question. i have asked this question your acting post, inspector general's, previous commissioners as well. do you, by chance, happen to know, since these meetings will occur right after the 15th of april, how many of the current number of irs employees actually employed professional help to file their taxes or use or some other means, other than the old fashioned taking the shoebox of the closet, the receipts, putting them together? >> unfortunately, i would have no way of knowing that. >> it would probably be instructive, as we deal with th
begin up on worrying about terrorism. the one place to partner with us is in cyber-security. use the right kind of passwords, don't share them, don't purposely open yourself to attack. that will go a long way to helping the national cyber security effort because it is one less segment we have to worry about. >> okay. we will take a break and come back and talk about the transportation system, how safe are the bridges, or bart. if you are in the city and want to get home with bart, can you do that? we will show you idea, as well, on things you should have in a kit in your car. >> yes. >> stay with us. . >>> okay, you have co-authored this book. your whole thing is about emergency management and what we do in a disaster. looks great. we are talking about earthquakes and the things we should do at home. if we let's say take bart to the city everyday and we are on bart when there is a big shaker, are we safe? >> yes. barrel has retro fitted their viaducts. to the level engineers understand earthquakes, they have retro fitted the transportation infrastructure that belongs to
's later on. but first, when it comes to cyber-security breaches, who are the bad guys, and what do they want? bill moller investigates next. just released, somewhat troubling data about the new and aggressive ways that the bad guys are breaking into our electronic records and stealing our personal data. bryan sartin is the director of verizon's risk team. they are the ones who conducted this study. they looked at 47,000 different incidents. bryan, tell us what we need to know. what were the main findings? - the main findings are, if you have a connection to the outside world, if you have an ip address, you might be a victim. but the big story this year is cyber-espionage. more than 20% of the cases that were tracked involved state- affiliated cyber-espionage campaigns. - so, is this coming from out of the country, do we know, or typically domestic? - it comes from a variety of places, but clearly one theme is common across all the contributors to this year's study: the very, very vast majority of cyber attacks we're tracking are coming from china. - and what are they typically goin
danger. >> let me ask you about another concern, and that is of course cybersecurity. you've said that the united states is facing a potential cyberpearl harbor. what did you mean by that? >> the reality is we're developing the kind of technology now that can virtually cripple a nation. you remember hurricane sandy. when the power went down in hurricane sandy, they lost their 911 capability. they lost the ability of gas stations to provide gas, banks to provide money, of hospitals closing, all because power went out. the reality is that we now have and other countries are developing the capability to cripple our power grid, to cripple our financial systems, and to cripple our government systems. that could create tremendous damage. >> now that you're out of washington, what is your assessment of how washington is handling the issue, foreign policy as well as economic policy, the budget and the deficit? >> i really worry about the disfunctionality in washington. you know, i travel around the world. other countries don't question our capability, our military capability, our technolo
journalism review ran past cybersecurity expert who declared such concerns and i'm quoting now, bull [bleep] you know what, it gives me an idea for a movie. (laughter) >> jon: welcome back. so last week as we were watch on the show, last week we learned that while our united states senate was unable to pass even the most basic gun control measures, australia had a successful gun control for almost two decade, john oliver visited there to find out more in part two of our three part series. enforced a national buyback of semiautomatic weapons. while also heavily regulating the purchase and storage of other firearms. the result was dramatically reduced level of gun violence. so why can't we do that here? to find out i sat down with long time aid to harry reid jim manly. >> the nra is still a very powerful force in this country. they have four million members who are very, very determined to get their way. >> and how can a nation of 300 million compete with that? >> it's difficult to understand sometime, isn't it but the fact of the mat certificate that i've got to think long and hard before yo
personal security and law ebb forcement issues which the columbia journalism review ran past cybersecurity expert who declared such concerns and i'm quoting now, bull [bleep] you know what, it gives me an idea for a movie. (laughter) ,x=pdhdhdh24m;d)!<&h&h&h&h >> jon: welcome back. so last week as we were watch on the show, last week we learned that while our united states senate was unable to pass even the most basic gun control measures, australia had a successful gun control for almost two decade, john oliver visited there to find out more in part two of our three part series. >> in 1996 following a massacre, australia's conservative government enforced a national buyback of semiautomatic weapons. while also heavily regulating the purchase and storage of other firearms. the result was dramatically reduced level of gun violence. so why can't we do that here? to find out i sat down with long time aid to harry reid jim manly. >> the nra is still a very powerful force in this country. they have four million members who are very, very determined to get their way. >> and how can a nation of 3
possible private information that arrives. with we're talking catherine lotrionte about cybersecurity and privacy. she is a professor at georgetown university, cyber project founder. to's also a former counsel the white house foreign intelligence advisory board. if you want to get involved in our conversation, please give us a call. the numbers are in your screen. you can also send us messages via social media, twitter@c- span wj. we also still take an e-mail or two. why does the government need this information from private companies like comes to cybersecurity? guest: there are certain things that the government have the capability of collecting themselves. they have a sense of the breadth and the depth of the threat that is being faced now. the number of private entities, banks, news media outlets, "new york times" under cyber attacks -- what the government has determined is that a key to the success in stopping these attacks is that we need to have as much information about the threat is possible. the private sector and the government from whole different set of information -- som
to see in this budget proposes a much-needed increase for cybersecurity which will help the department fulfill its significant cyberresponsibilities. passing legislation to compliment the president's executive order and address the cyberthreat is one of our highest priorities. i also welcome the administration's continued commitment to securing our nation's borders by maintaining staffing for the border patrol its ath its current historic levels and adding more than 3,400 protection officers to staff our ports of entry. these critical resources are paid for in part with modest fee increases. during my recent trips to our borders in arizona, where secretary napolitano, senator mccaul nd congresswoman joined me, i've been and heard from local mayors, from business leaders from front line officers, i've heard them say they need more help at our ports of entry. especially our ports of entry. i hear the same comments when i visit in texas later this month, i think april 30 and may 1. i want to say to my colleagues, for anyone who is interested in, a day and a half, going down to the boarder
, in the light of recent days, one of the issues they talked about is cybersecurity. and we saw within the past couple of days how cybersecurity can impact markets in a negative way. also, they're talking a little bit here about market infrastructure. so some things that we've all known have been problems, they're sort of collating them all in one place at one time. and, you know, this report will give you the cold sweat if you read it tonight, because there's a lot of stuff to worry about. but a lot of stuff that we knew was out there to worry about. >> that was the purpose. when you gather to decide what could go wrong, then you start to sweat a little bit. thanks, eamon. >> you bet. >> okay, to dunkin brands we go. shares have been getting a boost in today's session on the first quarter results they released. and while profits took a hit, due to higher costs and some other accounting situations, topline growth got a healthy boost with sales at u.s. dunkin' donuts locations coming in higher. >> so in this fiercely competitive market, how will dunkin brands keep on growing? joining us now is d
that include also protecting data in terms of cybersecurity threats? >> i think so. i think that, you know, every technology can be used for the benefit as well as used by people. we're investing in companies who are actually serving people well and providing some useful services. but there will be some companies develop that will try to fight with cybercrime as well. >> big debate around apple. what do you think about that company? >> well, i think apple is a great company. we don't invest in public companies, so that's not something that is actionable for us. but apple, no question, is a great company, which is here to stay. >> let me ask you about twitter, because this, of course, has been a big story recently. on your twitter investment, there have been some high-profile twitter hacks. of course, the most significant, last week, when the associated press twitter account was hacked. and it put out a false alert of an attack at the white house, briefly tanked the market, big story. what did you think when that was happening? >> that basically shows the power of social media and the kind
of the cybersecurity class and another leadership class. in their sophomore year, they get to choose a major. that is when things become more like a normal college or university. they get to choose those majors. again, it is another required calculus class, required physics class, some required engineering classes, history classes and some range of classes from their major. from there, a few options open up for the rest of the sophomore, junior and senior year. they get more courses in their major. always a healthy dose of required course work that everyone has to take. many of those court courses are science courses. credit hours of course work in a 47-month timeframe. host: unlike traditional or civilian school, you don't offer a graduate program, per se, do you? guest: that is right, purely undergraduate. number of highly motivated and exceptional students who by virtue of finishing their academic program and little bit earlier, we don't let anybody graduate early -- if they finish their academics early, they can pursue graduate studies at a local college or university while they are stil
on cybersecurity and "wall street journal" reports that they're considering several aggressive options to confront them ranging from diplomatic pressure to indicting chinese nationals in u.s. courts. officials tell "the journal" they're not necessarily eminent by demonstrate how >>> top stories of this monday his budget proposes an $800 milli million boost. >>> the atf wants to know what caused a massive fertilizer explosion in texas and a funny car that provides anything but laughs in charlotte. we have those details next. the projects will be done in a timely fashion and within budget. angie's list members can tell you which provider is the best in town. you'll find reviews on everything from home repair to healthcare. now that we're expecting, i like the fact that i can go onto angie's list and look for pediatricians. the service providers that i've found on angie's list actually have blown me away. join today and find out why over 1 million members count on angie's list. angie's list -- reviews you can trust. with the innovating and the transforming and the revolutionizing. it's enough to make
dropped in on a cybersecurity event to ask the bottom line question. >> will the utah center hold the data of american citizens? >> no. we don't hold data on u.s. citizens. people the at nsa. they take protecting your civil liberties and privacy as most important thing they do in securing this nation. >> after that event the nsa told us off camera they're collecting, analyzing and retain that data but their classified so they can't talk about publicly. so really they say it comes town to trusting them to enforce the rules they cannot discuss with us. shepship thank -- >> shepard: thank you. secret. sunday night, john roberts, right here on fox news channel. s redesigned site has this new score planner tool with these cool sliders. this one lets us know what happens if we miss a payment. oh. this one lets us know what happens if we use less credit. yeah. what's this one do? i dunno. glad nothing weird happened. right? score planner is free to everyone. free score applies with enrollment in freecreditscore.com guacamole slider still in beta. is engineered for comfort. like parts that create
. is the acid. >> one of the few areas that decrease activities going forward a cybersecurity, which we'll call for a new service member, increased offensive capabilities. what does this mean to the political military affairs bureau? is there some new set of skills? >> it's a great, great question. the state department undersecretary clinton focuses on the defense asked that if the legal aspect. there's so many different issues. it's important to have a coordinator. we feed into those types of issues. for example, my organization with foreign policy adviser to the cyber, commander insures we stay willing. when it comes to dod planning, an officer may bureau policy, which helps coordinate dod planning. so that is sort of my piece of it. all these various issues could require the state department to create an organization, a coordinator that works at the different perez, which have equities insider and you're absolutely right there's a lot of issues related to cyberand we feed into the offers. >> one last question here in the second row. >> thank you. he talked a lot about security assistance wit
aspects of this. we had cybersecurity but did it help? not really. meanwhile we're passing laws, we'll talk about it, and did it matter that they were muslims and will it affect legislation going forward. "the young turks" coming back. [ ♪ music ♪ ] >> "viewpoint" digs deep into the issues of the day. >> do you think that there is any chance we'll see this president even say the words "carbon tax"? >> with an open mind... >> has the time finally come for real immigration reform? satirical point of view. >> but you mentioned "great leadership" so i want to talk about donald rumsfeld. >> (laughter). >> watch the show. >> only on current tv. you know who is coming on to me now? you know the kind of guys that do reverse mortgage commercials? those types are coming on to me all the time now. (vo) she gets the comedians laughing and the thinkers thinking. >>ok, so there's wiggle room in the ten commandments, that's what you're saying. you would rather deal with ahmadinejad than me. >>absolutely. >> and so would mitt romney. (vo) she's joy behar. >>and the best part is that curre
in this cybersecurity game, stocks are so bad. intel and macaphee, they're winners. ed in wyoming. ed! >> caller: yes, jim, boo-yah from cheyenne, wyoming. >> it's been snowing out there, partner, what's up? >> caller: i'm looking at the index at the highest index since 2007. i'm looking at arr. i'd like your opinion. >> there is negative publicity about that group. i will recommend it. i think they're mistaken. let's go to trevor in massachusetts. trevor! >> caller: hey, jim, how are you? >> how are you? how are you? >> caller: i'm doing great. it's tough up here in boston. i'd like to ask your viewers tonight if they could consider do nating to the one fund in boston. this will help victims and families get through tough times here. >> absolutely. my daughter and i are helping out, too, yes, absolutely, people should do get absolutely. how can i help? >> caller: i'm calling about walter energy as a buyer of 26. it's dropped down a lot here, down to 16, up to 18 today. >> i think it's too cheap i do not want to sell the mood on the first day up. i think the stock can go higher and the other mineral
breaches, so is your phone at risk? we have a cybersecurity expert, morgan wright. rob, let me start with you. how much do you know about this bad news software, and, i mean, do you think all of us should be worried about it? >> well, in general, if you're on an android phone, you should be worried pretty much all the time anyway. that's the least secure of the platform out there. in fact, it's kind of ironic given that google came to market belly achingbout microsoft security. it's one of the clear areas they beat microsoft, and they are far less secure than microsoft, and it's considered the least secure and most likely to be compromised by malware on the planet. melissa: wow. morgan, that is scathing. do you agree with that review from ron? >> just because you get a virus on your phone doesn't mean you give up mobility. [laughter] this is a tale of two cities. this is the dickens classic revisited. you have apple with the highly secure store, but you don't get as much degrees of freedom when you develop it. on the other hand, you've got android which is the wild west, and rob's po
hopefully that will give you some sense of calm but actually the nrc in 2009 issued the cybersecurity rule for power react nurse. and the final implementation of this rule will occur somewhere between 2014 and 2017 depending on the particular plants of the different reactors. nonetheless there were basically eight steps that they have to work through. these plans had worked through seven of those steps and they were to complete those seven steps in the past december 2012 and we are now in the process of inspecting what they have done. so we have been thinking through this and we also have the cybersecurity team dedicated to anticipating these issues as they come along so we are taking this very seriously and now we have developed this very recently a roadmap for fuel cycle facilities dealing with cybersecurity issues for research and test reactors for byproduct materials like you see for this set of folks as well. see this as a six to eight year implementation. math. >> a lot of the reactors. >> but at the end of eight years in the computer field it's hard to imagine the standard-setting y
in. don't be incremental. deploy an impressive peacekeeping force. cybersecurity and then draw the force down once you deter the emergence of any violent resistance. aftermath of a conflict, the indigenous and contusions will have been disintegrated or discredited or totally destroyed. as a result, the intervening party will have to assume responsibility for public safety. for some interval. institutionsous can be restored and takeover. thirdly, you need to involve the neighboring societies in your project area did not in the piece being elements, but in the political aspects of the project. ,f they feel that your project the society you are trying to build or rebuild is not in their interest, they will have, by reason of their proximity, either commercial, familial, religious, ideological connections the ability to subvert your effort. the classic case of that is only brought peace to bosnia. --invited melissa visscher melissa bitch we invited the two leaders to that peace conference. that weok the view were worker medals, they would still be fighting in bosnia. this is a clas
's cyber-- importance of our nation's cybersecurity. the house will consider a number of bipartisan bills to reduce obstacles to voluntary information sharing between the private sector and government, secure our nation's infrastructure, better protect government systems and combat foreign threats. a number of committees will bring bills to the floor next week including the intelligence, oversight, government reform and science committee. we will continue to address cybersecurity from additional committees including homeland security and judiciary. of the bills coming to the oor we'll debate the cybersecurity information sharing act under a rule. and with that i thank the gentleman for yield and yield back. mr. hoyer: i thank the gentleman for that information. i want to share his view that the cybersecurity legislation is critically important legislation. i know that there are still continuing differences with reference to the protection of individual citizen's privacy on this legislation, but i also know, as the gentleman indicated, the critical nature of providing access and exchange o
, maria and bill, because -- >> but we don't have those rules, right? >> we may not have the cybersecurity we have had in the past. >> but that's the point, we have no rules. >> that's the thing. as unsettling as yesterday's episode was, your job is to regulate this market. do you feel there's a need for a new regulation of some kind that would keep that from happening, if that's at all possible? >> well, i don't know that we should get into sort of, you know, engineering how the social media system is going to work throughout the country. but i do think with regard to these high-frequency traders, who i call cheetah traders, because they're so fast, fast, fast, they're not even required to be registered with our agency. there's no requirement that they test their programs before they get put into the live production environment. there's no requirement that they have kill switches in case their cheetah programs go feral. so there's a lot of things that we do need to do that are sort of basic rules of the road for technology. we shouldn't just accept technology blindly, that it's all good,
. i want to bring in allen, director of research at the cybersecurity training organization. we watched two men shut down boston for days. that's a visible face of terrorism. the invisible, the countless hits from hackers all over the world every single day. how real is the threat of cyberterrorism? >> it's very real. in saudi arabia cyberterrorists took out 30,000 computers, just destroyed them. so it's physical damage being done but the real worry right now is financial loss. because our money used to be in vaults. now it's in a computer. when that computer goes away when you get online and there's zero in your checking account, it's the same as losing the money. and its -- go ahead. >> so if hackers are taking aim at our banks and we know they are, what kind of damage could this cause? can we overcome it and how quickly? >> well you saw what happens in a very short time. it comes right back no problem at all. if it lasts, if people try to get on and they cannot find their money and they call the bank and the bank says well we have technical troubles. we'l
is pure big brother. morgan wright, cybersecurity analyst. how you can protect yourself and your money. welcome back to the show, morgan. >> hello, melissa. melissa: i want to ask you that question first. people are talking about the story all day. we want to put a new twist on it to help our audience. how can people protect themselves. >> i got through tweeting the irs and paying my taxes and said hashtag, don't audit me, bro. unfortunately part of the electronic communications privacy act. it is an outtated law. when i was a cop and detective we had to follow the rules. one the things you knew the law always lagged behind technology when we started getting voice over ip and starting getting e-mail the law could never keep up with it. that is what is happening here. people need to protect themselves and understand what the government can do and what they can't do. not about avoiding or doing anything illegal. i want to have confidential conversations with my attorney and account apartment and i don't want the whole world to see a question that i ask can i do this construed by somebody
'm an expert in terms of that but i think that one of the things we've got to do, privacy, cybersecurity, all that stuff is critically important. so we have to work very closely with some of these big infrastructure providers, not only in terms of say corporations but also internet type companies that are, we're putting our personal data on there. david: but seems, to the novice, steve, that if you have more stuff just floating out there, it is easier for hackers to grab it, is it that true? >> i think that's a risk. there is lots of technologies but let me go at it a different direction. one of the things that we're doing is that we're all concerned about security. we're all concerned about privacy. so we also have investing in ways that you can store your content, store your data in your home so that you can protect it that way as well. david: that is interesting. liz: steve milligan, great to have you on. we would love to have you again, is that cool? >> absolutely. liz: western digital ceo and president. david: shares of wellpoint are hitting a 52-week high today following an earnings bea
. the president has issued an executive order regarding cybersecurity for the electric grid. in other organizations, some kind of mandatory enforceable standard, we are a long way from there. what do you see the role of doe in this regard to ensure this grid is protected? >> thank you, senator. i think that this is one of the greatest threats that we face. the department of energy and its facilities need a lot of protection against cyberattack. specifically on the grid, i think that we need to bring together the assets across the department to intelligence and electricity. we have a lot of assets. also with national security labs on cybersecurity. so we need to work on the technologies and the distribution of integration systems and we also need to work in my view combining the national security act for the system. >> is your vision compatible with the president? >> completely, yes, sir. >> thank you. >> thank you. the senator had to run for a second. i am next on the list. i'm not sure how i got that good fortune, but following the would-be senator risch. doctor, thank you so much.
not introduce ad cybersecurity bill so far this year. back to you. gregg:. martha: elizabeth, thank you very much. gregg: this sunday be sure to tune in fox news reporting, your secret's out. a special look at cybersecurity concerns. it is hosted by john roberts and it airs this sunday night at 9:00 p.m. eastern time. check it out. martha: important story there. all right, we're getting started this morning and another state is debating the idea of doing away with state income taxes. want to know where it is, right? where this is happening and will it be a as good for your wallet as it is for some businesses? we'll find out. gregg: plus new threats from north korea. why its neighbor to the south says a missile test could happen any day now. martha: and new details, what a story this was yesterday. the twisted fantasies that we're now learning about this morning in this man who is accused of running around with a box cutter and stabbing his college classmates. an update from one of those who was hurt in this whole issue yesterday, this incident. first-hand you will hear from them. >> i but th
debate is coming up. rick: new information on efforts to combat the growing cybersecurity threat here at home as a house intel committee takes up a revamped bill, one with new privacy protections. this is in response to a previous bill was in essence a blank check for government surveilance. chief intelligence correspondent catherine herridge is live in washington. what is different about this version of the bill now? >> reporter: rick, this revamped bill will allow the federal government to swap information with private industry in an effort to track emerging cyberthreats or mitigate the fallout of a successful attack in realtime. the cosponsors of the bill, republican congressman mike rogers, who chairs the house intelligence committee and the ranking kmem per of the committee, duch rupert percent berger say they made significant improvements that should satisfy critics including an amendment that would sanitize or remove personally identifiable information and they say there is now more oversight for how the information is used. >> automatic reviews from congress each year to make
information on cybersecurity today as the house intelligence committee aproves a new bill to help protect computer networks from cyber attacks. the measure sets up a voluntary system for companies to share threat information with the government in exchange for some liability protections. this sunday the results of an exclusive fox news investigation into government data collection and whether your secrets are safe. chief intelligence correspondent catherine herridge is live in washington. luckily we have to secrets, catherine. so we don't have to worry. >> reporter: we certainly don't. jenna: what is the utah data center? >> reporter: the utah data center is like a giant thumb drive or storage facility. this facility even if you ask to get access you can't get inside it. what we did in our investigation we rented a helicopter and we took to the skies and this is really the best way to get a sense of the massive scope of this data center. from the skies it is truly an awesome sight. the data center by most estimates can hold five data bites of data. just one zeta byte is the equivalent of
lanes remain open. >> let me close by asking briefly about cybersecurity. most people have concluded that the -- that many of the attacks on our systems in this country are coming from china. and are state-sponsored. but this is the new warfare of the future. ap -- and do you feel we are prepared to defend ourselves from these attacks and what can you tell us about our preparedness? >> well, cyber is one of the areas in this budget where we have proposed increases of considerable increases, more people, more capacity. you also know that we have an interagency dimension to this. department of homeland security has most of the domestic authority. we, too, have authority to protect our interests. n.s.a. and cyber command are the two main areas of expertise and responsibility. you have correctly identified the greatest threat to our security, economic security, political security, diplomatic security, military security that confronts us. not to minimize other threats. we are prepared and are preparing and strengthening that capacity to deal with these issues. we do know that these attack
to cybersecurity. i understand your concern. maybe there is a way through some other area for cyber education even if we cannot significantly increase that account. >> we recognize the vulnerabilities that we all have. civil society makes it more difficult to use the tools you're establishing. it is a delicate balancing act. i think the more that americans become more sensitized to the battle ahead of us the more that we can all be at the wheel. i want to raise the question of the new office proposed in the president requesting 27 million dollars. iss e office ofyber infrastructure analysis. protection and the office of cyber can indication was tt can you talkw is considered ceary? to help ussigned get ours is abilities under the executive order. sharingthat information of the private sector and with the government. other parts is in of the department. we want to centralize and give our central role that analytics involved in cyber. it'll probably larger, but we want to make sure that we have it. >> do have a timetable? we're moving on implementation. we would like to form the office as soon as we
as darpa, including cybersecurity and counterterrorism. this is a little more than a half-hour. >> thank you, jen. good afternoon, everyone. it's really great to be here with you today. many of you have seen or covered with leading-edge technologies and projects from darpa. what i want to do today is add to that a better picture of what our agency does for the nation, how we do it, how we think about our mission in the context of today's reality and the future we're building ahead. i'll speak for a few minutes and then i'd be happy to take your questions at the end. we started the beginning. darpa's is created in 1958 in response to the sizes but been launched. even at that time as of now, we all understood technology is a cornerstone of our national security. in 1858, we understood we needed a way to make sure we didn't have that technological supplies again. in the 55 years since then, darpa has prevented technological surprise by creating supplies other. today if you look at how we fight, you will find in our military capabilities really critical systems and capabilities like decision
and cybersecurity issues. here is a look at what he says keeps him that night. >> question i would like to ask, what keeps you up at night. >> well, that is a silly disposition. i sleep less well, i will tell you that. what keeps me that might? well, i worry about the sustainability of the economy, and europe continues to be a problem. i think it is being dealt with on balance in a good way but it is a long-term problem. i think the export oriented economy, given the problems in our slow growth are slowing down and still continue to perform okay but certainly not as they have in the past. you know, we have our own unique problems at this point with the government increasingly dare i use the word dysfunctional don't quote me, please, but i'd sure i will be. you know, the issues that people are wrestling with and need to get resolved hopefully sooner rather than later. but coming to know, i'm no expert but i am not terribly confident that a big bank solution is going to be found here. so all of that keeps me up. we have exposure in the various countries, so we watch it very carefully. another issue th
will happen that keeps me up is cybersecurity. and one of hista last speeches describe the single biggest threat to the united states. when he says that, you certainly have to listen. targeted, all of the big banks have been targeted. cybersecurity is not just about hackers. it is not just about guys trying to get your credit card number. in the case of many economies, there has been a lot of press and israel.and iran it is a reality. these are very sophisticated people. building firewalls against them will be difficult. we have got a strong team. this is a threat. it is one that should keep us all up at night. >> on a more positive note, you have traveled around. this is a personal question. where do you see opportunities that people should take a second look at? i think columbia is a strong .arket for u.s. exporters do you have a couple of places in mind? >> yes. there is a term that we use internally. the color frontier economies. -- we call it frontier economies. golia, has asked o etc. they are actually quite strong. they have got hard-working people and are increasingly well-educate
Search Results 0 to 49 of about 89 (some duplicates have been removed)